Skip to main content

Minutes IETF119: ace
minutes-119-ace-00

Meeting Minutes Authentication and Authorization for Constrained Environments (ace) WG
Date and time 2024-03-19 07:30
Title Minutes IETF119: ace
State Active
Other versions plain text
Last updated 2024-04-12

minutes-119-ace-00
message from Chairs. (5 minutes)

TH doing introduction

MT: the presentation on the pub-sub can be moved to the end
TM: That’s fine

draft-ietf-ace-oscore-gm-admin (10 minutes)

MT presenting

Presented slides:
https://datatracker.ietf.org/meeting/119/materials/slides-119-ace-draft-ace-oscore-gm-admin-00.pdf

MT: Summary out WG Last Call outcomes. Addressed comments from Cigdem and
Göran, plus editorial comments from Carsten and comments already in the
authors’ queue. MT: Next step is addressing Carsten’s comments and submit a v
-12, hopefull ready to send to the IESG. TM: Sounds good.

[no comments / questions ]

draft-ietf-ace-workflow-and-params (10 minutes)

MT presenting

Presented slides:
https://datatracker.ietf.org/meeting/119/materials/slides-119-ace-draft-ace-workflow-and-params-00.pdf

MT: Any feedback on the changed formulation in the two profile requirements
from RFC 9200? Goran: The original formulation was also fine, but the new one
is also fine, no change needed to it.

GS: New hackathon item, on the token upload. The client asks the AS for a token
upload to RS. If token is uploaded successfully by the AS, then it is not
provided to the client. GS: But it might be the case that, even so, RS then
lost token, or deleted the token for lack of space. To be safe in that case,
the client might ask the AS to be provided with a copy of the access token to
present to RS, even in case of successful upload by the AS. What do you think?

Dave Robin: You mentioned that you have made a change where the client needs to
be aware of the new workflow and opts-in. You changed it. Why? Preloaded tokens
are for clueless clients […] The AS pre-deliveres the token to RS. The client
attempts to connect to the RS. […] It is an important use case for us. There
are few RSs that want to protect themselves. The AS effectively pre-delivers
the access token. The Client doesn’t even know that they use tokens.

DR: It’s a great migration plan. You said “the client must optin”. Why?
Marco: The change was not about security. A client not supporting the new
worflow but simply complying with the original one, expects to find an access
token in a successful response from the AS. That Client would consider a
different successful response non valid, and it cannot follow-up anyway since
it has received no access token from the AS. Dave: it will just get an answer
back from the RS […] CA (on chat): If the client doesn’t talk to the AS at all,
the client doesn’t need to do that opt-in in any request it sends to the AS –
should all just work fine. GS (on chat): Agree. CA (on chat): I think it should
just work as Dave describes it, without any impact of the changes to the
workflow Marco made. You’re just using a part of the new workflow, and that’s
good. GS (on chat): Dave’s proposal should work fine and would be great to
include as a deployment case in the draft.

TM: Issue to be taken up to the list.

draft-ietf-ace-group-oscore-profile (10 minutes)

RH presenting

Presented slides:
https://datatracker.ietf.org/meeting/119/materials/slides-119-ace-group-oscore-ace-profile-slides-ietf-119-00.pdf

RH (p2): recap on motivations; access control within groups. For non-basic use
cases, being a group member does not imply any particular access right per se.
RH (p3): access control to access group members’ resources is handled
separately, in line with the NIST zero-trust principles. RH (p4): this profile
of ACE uses Group OSCORE as security protocol; it assumes having joined the
OSCORE group first, then it focuses on accessing resources at group members.
The access token is bound to the Group OSCORE Security Context and the
authentication credential that the Client uses in the group. RH (p5): example
of protocol execution

RH (p6-7): Summary of updates in the latest v -01. Deleting the Access Token is
not followed by deleting the Group OSCOER Security Context. Renamed a TLS
Exporter Label to be more appropriate (used to assist proof-of-possession
between C and AS). Also discussed the computation of PoP evidence separately
for (D)TLS 1.2 and 1.3. RH (p7): Fixed and clarified the computation of the PoP
evidence when C and AS use OSCORE. Now using the same HDKF they use in their
OSCORE Security Context. Also correctly handled the case where the ID Context
is not set at all (different than an empty one). RH (p8): editorial
improvements; clarified expectations on the AS when processing the PoP evidence
received from the Client in the Access Token Request.

RH (p9): Next steps include improving notation in the examples, consider Access
Token covering more than one OSCORE group, advice on how separately using the
OSCORE profile to target a single RS server, aligning the text confirming
adherence to the profile requirements from RFC 9200.

draft-ietf-ace-est-oscore (10 minutes)

MV presenting

Presented slides:
https://datatracker.ietf.org/meeting/119/materials/slides-119-ace-draft-ietf-ace-coap-est-oscore-00.pdf

MV (p2-3): The latest version -04 addresses JPM’s review and related issues,
now closed. MV (p4): Closed issue #34, seemingly editorial and related to
draft-ietf-cose-cbor-encoded-cert. MV (p5): Closed issue #35, on mandatory to
support Content-Formats for servers. MV (p6): Issue #38 needs feedback, still
on support of Content-Formats. Due to a “MAY”, this can result in
interoperability issues, also from experience in ANIMA. A way to handle this is
in draft-ietf-anima-constrained-voucher. I will open an issue an solicit
feedback. MV (p7): Issue #43 opened by GS, on using static DH keys, which are
also in other NIST specifications. The same keys can be used also for signing.
New next is allowing the use of such keys for one-time signing. MV (p9): Still
open issues are #36, #29, and #19. MV (p10): We’ll address the still open
issues; we’d like reviews before being ready for WG Last Call.

draft-ace-edhoc-oscore-profile (10 minutes)

GS presenting

Presented slides:
https://datatracker.ietf.org/meeting/119/materials/slides-119-ace-edhoc-osore-profile-00.pdf

GS (p2-3): recapping the profile and its workflow GS (p4): the access token is
either uploaded to /authz-info or in EDHOC message_3 in an EAD item (not in EAD
item of EDHOC message_1 anymore). When in an EAD item of EDHOC message_3,
either the actual access token or an identifier is conveyed.

GS (p5-6): Shown one optimized workflow, relying on compact credential
identifiers. In this case, each credential owner is selecting the identifier of
its own credential, with the risk of collision if we consider a large set of
interacting peers. GS (p7): It would be good to have some alternative
identifiers that are still unique but not discretionally generated by the
interested party. Hashes would be good. We have that for certificates, but not
for CCS and CWT. That means registering the necessary COSE Header Parameters
and CWT/JWT confirmation methods. MT: A document in COSE
https://datatracker.ietf.org/doc/html/draft-tschofenig-cose-cwt-chain is
defining COSE Header parameters for chain/bag/hash/uri of CWT. It might be
already ok for covering the CWT case, with a caveat to double-check: it
considers CWT in general, whlie EDHOC thinks of an authentication credential as
a CWT including a COSE Key (for which a COSE Header Parameter ‘kcwt’ has been
defined and registered). CA (on chat): (Yeah, what Marco said :-) )

GS (p8): Discussion on the possible use of the EDHOC Reverse message flow.
Fundamentally possible, just overlooked so far. It requires more thinking.
Having the access token conveyed in EDHOC would need to be in an EAD item of
EDHOC message_2.

draft-ietf-ace-pubsub-profile (5 minutes)

Not presented due to lack of time.